ATIS 2015
Conference Program
The 6th International Conference on Applications and
Techniques for Information Security
Sponsored By
ATIS 2015 Organization
Beijing, China
November 4-6, 2015
2
CONTENTS
Welcome to ATIS-2015 ......................................................... 3
Organization .......................................................................... 4
ATIS-2015 SCHEDULE ........................................................... 7
3
Welcome to ATIS-2015
As Steering Committee Chair of the sixth International Conference on Applications
and Techniques in Information Security, it is my pleasure to welcome all participants,
especially those whose papers have been chosen to appear in the Conference
proceedings, but also those members of the Programme Committee who made
insightful and constructive comments on the submissions, and those members of the
audience who prompted speakers into thinking about how their work might be
extended.
It is a great honour to host our Keynote Speakers, Professor C.Pandu Rangan from
IIT Madras, India and Professor Jintai Ding from the University of Cincinnati, USA.
The speech of Professor Rangan concerns memory scrapper attacks, while that of
Professor Ding deals with Secure Key Exchange based on LWE. These two speeches
are both related to Information Security, and they exhibit research contents of Security
from different aspects in current times.
I appreciate deeply the time the very busy members of the Programme Committee
have spent on this conference. They are helping ATIS to move to ever greater
excellence.
Special thanks are due to our Honorary Chairs Li Guo and Zhen Han, Conference
Co-Chairs Professor Jiqiang Liu and Jianlong Tan, Programme Committee Co-Chairs,
Dr. Wenjia Niu and Gang Li, for their outstanding work in negotiating with our
publisher Springer, and in organizing the submission and reviewing system.
Finally, no conference can be a success without a dedicated local organization team,
and I must offer heartfelt gratitude to our Conference Secretary Wei Wang and Shaowu
Liu.
We all hope that you enjoy ATIS-2015 and will return for ATIS-2016.
With Best Wishes
Lynn Margaret Batten, FACS, GAICD
Senior Member, IEEE
Director of the Securing Cyberspace Laboratory,
School of Information Technology
Deakin University, Melbourne, Australia
4
Organization
Programme Committee
The Programme Committee was responsible for the scientific content of ATIS 2015. It
prepared the final list of conference topics, invited speakers, and refereed accepted
papers. The Programme Committee consists of:
Guoyong Cai Guilin University of Electronic Technology, China
Lang Chang Guilin University of Electronic Technology, China
Changed Zhang Southwest Jiaotong University, China
Heejo Lee Korea University, Korea
John Yearwood Deakin University, Australia
Jiaxin Han Xi'an Shiyou University, China
Kwangjo Kim KAIST, Korea
Kui Ren University of Buffalo, U.S.
Lei Pan Deakin University, Australia
Leila Batina Radboud University, The Netherlands
Liehuang Zhu Beijing Institute of Technology, China
Qingyun Liu Institute of Information Engineering, Chinese Academy of
Sciences, China
Rafiqul Islam Charles Sturt University, Australia
Morshed Choudhury Deakin University, Australia
Matthew Warren Deakin University, Australia
Ping Xiong Zhongnan University of Economics and Law, China
Sheng Zhong Nanjing University, China
Jinqiao Shi Institute of Information Engineering, Chinese Academy of
Sciences, China
Zhongzhi Shi Institute of Computing Technology, Chinese Academy of
Sciences, China
5
Steve Versteeg CA, Australia
Tianqing Zhu Deakin University, Australia
Tingshao Zhu Institute of Psychology, Chinese Academy of Sciences, China
Wei Ren China University of Geosciences, China
Xiaofeng Wang Siemens Research
Gang Xiong Institute of Information Engineering, Chinese Academy of
Sciences, China
Rui Xue Institute of Information Engineering, Chinese Academy of
Sciences, China
Xun Yi RMIT University
Fei Yan School of Computer, Wuhan University, China
Yuan Zhang Nanjing University, China
Yongbin Zhou Institute of Information Engineering, Chinese Academy of
Sciences, China
Organizing Committee
The organizing committee was responsible for functional organization of ATIS 2015,
including the selection of the most suitable locations, preparation of the Website and
conference programme, arrangement of the social programme, production and
publication of the proceedings volume, coordinating the contact between invited
speakers, authors, participants, sponsors and publishers.
The Organizing Committee consists of:
Steering Committee
Chair
Lynn Batten (Deakin University, Australia)
Honorary Chairs: Li Guo (Chinese Academy of Sciences, China)
Zhen Han (Beijing Jiaotong University, China)
Conference Co-Chairs Jiqiang Liu (Beijing Jiaotong University, China)
Jianlong Tan (Chinese Academy of Sciences, China)
6
Program Committee
Co-Chairs
Wenjia Niu (Chinese Academy of Sciences, China)
Gang Li (Deakin University, Australia)
Local Organization
Committee
Yongzhong He (Beijing Jiaotong University, China)
Wei Wang (Beijing Jiaotong University, China)
Conference Secretary Wei Wang (Beijing Jiaotong University, China)
Shaowu Liu (Deakin University, Australia)
Sponsors
We would like to thank the following institutions for sponsoring the ATIS 2015 with
financial and technical resources:
Beijing Jiaotong University, China
Deakin University, Australia
Institute of Information Engineering, Chinese Academy of Sciences, China
TULIP Lab, Deakin University, Australia
Beijing Universal Cloud Data Analytics Technology, China
7
ATIS-2015 SCHEDULE
November 3 (Tuesday), 2015
14:00-18:00 Registration
Location: 1st Floor of Machine Building (机械楼一层)
November 4 (Wednesday), 2015 @Beijing Jiaotong University
9:00-9:20 Opening ATIS-2015 Conference Chair: Prof. Jiqiang Liu
ATIS-2015 Program Committee Co-Chair: Dr. Gang Li
Location: Academic Reporting Hall,2nd Floor of Machine Building (学术报告厅,机械楼
二层)
9:20-10:20 Invited Talk Memory Scrapper Attacks - Threats and Mitigations
Prof.C.Pandu Rangan, Fellow, Indian National Academy of Engineering Introduced by Dr Gang Li, Deakin University
Location: Academic Reporting Hall,2nd Floor of Machine Building (学术报告厅, 机械
楼二层)
10:20-11:20 Invited Talk A simple and provable secure (Authenticated) Key Exchange based on LWE
Prof. Jintai Ding, University of Cincinnati, U.S. Introduced by Prof. Jiqiang Liu,Beijing Jiaotong University
Location: Academic Reporting Hall,2nd Floor of Machine Building (学术报告厅,机械楼
二层)
11:20-11:50 Group Photo
Location: Academic Reporting Hall,2nd Floor of Machine Building (学术报告厅,机械楼
二层)
12:00-13:00 Lunch Location: Hongguoyuan Hotel
8
13:30-17:20 Sessions&Discussions (The 4th and 5th Meeting Room)
===================================================
At the 4th Meeting Room
Session Chair: Wei Wang
Category: Cryptography
13:30-13:55 An Image Encryption Algorithm based on Zigzag Transformation
and 3-Dimension Chaotic Logistic Map Yuzhen Li, Xiaodong Li, Xin Jin, Geng Zhao, Shiming Ge, Yulu Tian, Xiaokun Zhang, Kejun
Zhang, Kejun Zhang
13:55-14:20 An Improved Cloud-Based Revocable Identity-Based Proxy
Re-encryption Scheme Changji Wang, Jian Fang, Yuan Li
14:20-14:45 Cryptographic Public Key Length Prediction
M. Amain and L.M. Batten
14:45-15:10 An image encryption algorithm based on Chua’s chaos and Baker’s
transformation Chupei Chen, Jing Li, and Hongmin Deng
15:10-15:40 Coffee Break
15:40-16:05 Quantum differential cryptanalysis to the block ciphers
Hongwei Li,Li Yang
16:05-16:30 An Enhanced Authentication Scheme for Virtual Private Network
Access based on Platform Attributes of Multi-level Classification
Xun Chen, Jiqiang Liu, Yanfeng Shi, and Zhen Han
16:30-16:55 Public Key Timed-Release Attribute-Based Encryption Ke Yuan, Nan Shen,Yonghang Yan, Zheli Liu,Chufu Jia
16:55-17:20 Color Image Encryption in CIE L*a*b* Space
Xin Jin, Yingya Chen, Shiming Ge, Kejun Zhang, Xiaodong Li, Yuzhen Li, Yan Liu, Kui
Guo, YuluTian, GengZhao, Xiaokun Zhang, Ziyi Wang
===================================================
9
===================================================
At the 5th Meeting Room
Session Chair: Yanan Cao
Category: Trust Computing and Privacy Protection
13:30-13:50 Structural Analysis of IWA Social Network Wenpeng Liu, Yanan Cao, Diying Li, Wenjia Niu, Jianlong Tan, Yue Hu, Li Guo
13:50-14:10 A Differentially Private Method For Reward-Based Spatial
Crowdsourcing Lefeng Zhang, Xiaodan Lu, Ping Xiong, Tianqing Zhu
14:10-14:30 Do Applications Perform its Original Design? A Preliminary
Analysis from Internet Big Data Lei Qian, Yinlong Liu, and Yanfei Zhang
14:30-14:50 Trust Prediction With Trust Antecedent Framework Regularization
Haiyang He, Yong Wang, Guoyong Cai
14:50-15:10 Trust Prediction based on Interactive Relationship Strength
Guoyong Cai, Liyuan Wang, Haiyang He
15:10-15:40 Coffee Break
Session Chair: Gang Xiong
Category: Evaluation, Standards and Protocols
15:40-16:05 Discover Abnormal Behaviors Using HTTP Header Fields
Measurement Quan Bai, Gang Xiong, Yong Zhao, Zhenzhen Li
16:05-16:30 Reconstruction of Potential Attack Scenarios of the OpenID
Protocol Towards Network Forensics Analysis Dongyao Ji, Junliang Liu, and Gang Yao
16:30-16:55 A Lightweight Code-based Authentication Protocol for RFID
Systems Zhuohua Liu, Wei Zhang, Chuankun Wu
16:55-17:20 An Overview of Ad Hoc Network Security FanYang,Yulan Zheng, Ping Xiong
10
===================================================
17:30 Conference dinner Location: Hongguoyuan Hotel
November 5 (Thursday), 2015 @ Beijing Jiaotong University
8:30-12:10 Sessions&Discussions (The 4th and 5th Meeting Room)
===================================================
At the 4th Meeting Room
Session Chair: Xiaojun Chen
Category: Tools and Methodologies
8:30-8:55 RICS-DFA: Reduced Input Character Set DFA for Memory-efficient
Regular Expression Matching Qiu Tang, Lei Jiang, Qiong Dai, Majing Su, and Hongtao Xie
8:55-9:20 A Clustering Approach for Detecting Auto-Generated Botnet Domains Pu Yang, Xiaojun Chen, Yiguo Pu, JinQiao Shi
9:20-9:45 Modeling of Mobile Communication Systems by Electromagnetic
Theory in the Direct and Single Reected Propagation Scenario Guo Sheng, Shuping Dang, Nadim Hossain, and Xu Zhang
9:45-10:10 Bayesian Reliability Assessment Method for Single NC Machine
Tool under Zero Failures Hongzhou Li, Fei Chen, Zhaojun Yang, Yingnan Kan, Liding Wang
10:10-10:30 Coffee Break
10:30-10:55 MIRD: Trigram-based Malicious URL Detection Implanted with
Random Domain Name Recognition Xiong Cuiwen, Li Pengxiao, Zhang Peng, Liu Qingyun, Tan Jianlong
10:55-11:20 A Novel NB-SVM-based Sentiment Analysis Algorithm in
Cross-cultural Communication Yuemei Xu, Zihou Wang, Yuji Chen
11:20-11:45 Time-varying Impulsive Anticontrol of Discrete-time System Qian Wang, Wei Xiong,Ya Shuang Deng
11:45-12:10 Leakage Prevention Method for Unstructured Data Based on
Classification Hao Li, Zewu Peng, Xinyao Feng, Hongxia Ma
===================================================
11
===================================================
At the 5th Meeting Room
Session Chair: Chuang Zhang
Category: Cloud Security and Applications
8:30-8:50 You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based
on Botcloud Baohui Li, Wenjia Niu, Kefu Xu, Chuang Zhang, Peng Zhang
8:50-9:10 Quantitative Evaluation Method of Cloud Security Xinlong Zhao, Weishi Zhang, Wei Ma
9:10-9:30 A Large-scale Distributed Sorting Algorithm Based on Cloud
Computing Na Pang, Dali Zhu, Zheming Fan, Wenjing Rong, Weimiao Feng
9:30-9:50 Analysis and Exploit of Directory Traversal Vulnerability on Vmware Yuanyuan Bai, Zhi Chen
9:50-10:10 OpenStack Vulnerability Detection and Analysis Li Lu, Zhen Han, and Zhi Chen
10:10-10:30 Coffee Break
Session Chair: Liang Ge
Category: System Design and implementations
10:30-10:50 Decryption and Forensic System for Encrypted iPhone Backup Files
Based on Parallel Random Search Liang Ge, Lianhai Wang
10:50-11:10 The Method and System Implementation of Unstructured Data
Tracking and Forensics Guangyu Gu, Shujuan Zhang, Xuefei Wang, Xiang Cai, Sheng Chen
11:10-11:30 The Design and Implementation of Data Security Management and
Control Platform Hong Zou, Yang Qian, Yanshuai Zhao, Kun Ding
11:30-11:50 A Data Recovery Method for NTFS File Systems Zewu Peng, Xinyao Feng, Liangliang Tang, Meijie Zhai
11:50-12:10 Design and Implementation of Aircraft Pan-Tilt Control System
Based On Mobile Terminal Minghai Shao, Yingding Zhao, Jianlong Tan
12
===================================================
12:00-13:00 Lunch Location: Hongguoyuan Hotel
14:00-14:30 Awards and Journal Recommendation
Location: The 4th Meeting Room
14:30-15:30 Demo Shows;Deakin University & BJTU &IIE,CAS
Location: The 4th Meeting Room
15:30-15:40 Closing Remarks ATIS-2015 Program Committee Co-Chair: Dr. Gang Li
Location: The 4th Meeting Room